Ethical Hacking known as white-hat hacker or penetration testing or vulnerable assessment. What make it different from hackers, ethical hacking have structured approach and approved by company/victim.
The Five Structure Approach
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Covering Tracks
Reconnaissance
Any move or step taken where all information being gathered.
Using passive information gathering
No triggered.
Scanning
Start active information gathering
Focus on discover any loop hole (vulnerabilities, services or open ports).